Penetration Test
Main Topics Definition of pentest, purpose, issues to be considered External network scans and active information gathering Discovery and vulnerability scanning Exploitation Domain and end user computers penetration tests Things to do after abuse (post-exploitation) Database penetration tests Network components penetration tests and second layer attacks Security mechanisms circumvention methods – Social engineering Web applications …